Gem-Security / gem-environment-assessment
Utilities for assessing cloud environments
☆18Updated last year
Alternatives and similar repositories for gem-environment-assessment
Users that are interested in gem-environment-assessment are comparing it to the libraries listed below
Sorting:
- AWS CloudSaga - Simulate security events in AWS☆455Updated this week
- ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring su…☆989Updated last week
- Trigger vulnerability assessments for containers which are active in a Lacework account/organization☆22Updated last year
- AWS IAM linting library☆1,081Updated 3 weeks ago
- A python module to allow for easy integration with the Lacework APIs.☆18Updated 10 months ago
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆390Updated last month
- Open Cloud Security Posture Management Engine☆340Updated 3 years ago
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆589Updated this week
- [MAMIP] Monitor AWS Managed IAM Policies Changes☆484Updated this week
- Bare minimum AWS Security Alerting and Secure by default Configuration☆494Updated this week
- ☆982Updated 4 months ago
- IAM Least Privilege Policy Generator☆2,080Updated 2 weeks ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,486Updated 9 months ago
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆255Updated this week
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆241Updated 2 months ago
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆545Updated 2 weeks ago
- Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.☆545Updated 4 months ago
- The AWS Secure Environment Accelerator is a tool designed to help deploy and operate secure multi-account, multi-region AWS environments …☆752Updated last week
- Automate permissions to your cloud and critical applications.☆241Updated last year
- Runs checks to see if an EKS cluster follows EKS Best Practices.☆907Updated 3 months ago
- A command-line tool to get valuable information out of AWS CloudTrail☆815Updated this week
- A consolidated series of structured data for cloud identity and access management systems, including datasets for AWS, Azure, and Google …☆262Updated this week
- Protect your data in AWS S3 with DataCop!☆14Updated 8 months ago
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆560Updated this week
- Built-in Panther detection rules and policies☆384Updated this week
- Parse and Process AWS IAM Policies, Statements, ARNs, and wildcards.☆441Updated 10 months ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆899Updated 3 years ago
- AWS Control Tower Account Factory☆699Updated this week
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,083Updated last week
- Cloud Formation resources for integrating Lacework with an AWS Organization (NOT using Control Tower)☆11Updated this week